Firefox vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.mozilla.org|Firefox package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Improper Certificate Validation

[,134)
  • H
Use After Free

[,134)
  • H
Improper Privilege Management

[,134)
  • H
Use After Free

[,134)
  • C
Out-of-bounds Write

[,134)
  • H
Out-of-bounds Write

[,134)
  • H
Out-of-Bounds

[,134)
  • M
Out-of-Bounds

[,134)
  • H
Open Redirect

[,134)
  • M
Access Control Bypass

[,134)
  • H
User Impersonation

[,134)
  • M
Information Exposure

[,133)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,133)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,133)
  • H
Out-of-bounds Write

[,133)
  • M
Improper Initialization

[,133)
  • M
Double Free

[,133)
  • M
Improper Authentication

[,133)
  • M
Access Control Bypass

[,133)
  • M
Cross-site Scripting (XSS)

[,133)
  • H
Arbitrary Code Injection

[,133)
  • H
Race Condition

[,133)
  • M
Improper Check for Unusual or Exceptional Conditions

[,133)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,133)
  • M
NULL Pointer Dereference

[,133)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,133)
  • M
NULL Pointer Dereference

[,133)
  • H
Out-of-Bounds

[,133)
  • L
Denial of Service (DoS)

[,126)
  • M
Race Condition

[,132)
  • H
Out-of-Bounds

[,132)
  • M
Denial of Service (DoS)

[,132)
  • H
Use After Free

[,132)
  • H
Incorrect Default Permissions

[,132)
  • M
Cross-site Scripting (XSS)

[,132)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,132)
  • M
Exposure of Resource to Wrong Sphere

[,132)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,132)
  • M
Denial of Service (DoS)

[,132)
  • H
User Impersonation

[,132)
  • H
Denial of Service (DoS)

[,131.0.3)
  • H
Use After Free

[,131.0.2)
  • L
Information Exposure

[,131)
  • H
Origin Validation Error

[,131)
  • H
Arbitrary Code Injection

[,131)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,131)
  • M
Denial of Service (DoS)

[,131)
  • H
Arbitrary Code Injection

[,131)
  • M
Out-of-bounds Write

[,131)
  • M
Out-of-bounds Write

[,131)
  • C
Out-of-bounds Write

[,131)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,131)
  • M
Information Exposure

[,131)
  • C
Out-of-Bounds

[,131)
  • C
Out-of-Bounds

[,131)
  • M
Information Exposure

[,129)
  • H
URL Redirection to Untrusted Site ('Open Redirect')

[,130.0.1)
  • H
Type Confusion

[,128)
  • M
Type Confusion

[,130)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,130)
  • M
Information Exposure

[,130)
  • H
Improper Handling of Exceptional Conditions

[,130.0)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,130)
  • M
Out-of-bounds Write

[,130)
  • L
User Interface (UI) Misrepresentation of Critical Information

[,130)
  • H
Out-of-Bounds

[,130)
  • H
Out-of-Bounds

[,130)
  • M
Improper Verification of Source of a Communication Channel

[0,)
  • C
Cross-site Request Forgery (CSRF)

[0,)
  • C
Use After Free

[,129)
  • C
Use After Free

[,129)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,129)
  • M
Information Exposure

[,129)
  • C
Cross-site Scripting (XSS)

[,129)
  • H
Out-of-bounds Read

[,129)
  • H
Information Exposure

[,129)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,129)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,129)
  • H
Improper Access Control

[,129)
  • H
Use After Free

[,129)
  • M
Type Confusion

[,129)
  • C
Out-of-bounds Write

[,129)
  • H
Use After Free

[,129)
  • M
Cross-site Scripting (XSS)

[,95)
  • H
Improper Access Control

[,95)
  • M
Information Exposure

[,128)
  • H
Improper Restriction of User Interface Security Features

[,128)
  • H
Out-of-bounds Read

[,128)
  • M
Improper Input Validation

[,128)
  • M
Out-of-Bounds

[,128)
  • M
Improper Input Validation

[,128)
  • H
Use After Free

[,128)
  • H
Infinite Loop

[,128)
  • M
Reliance on Cookies without Validation and Integrity Checking

[,128)
  • H
Out-of-bounds Write

[,128)
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

[,128)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,128)
  • C
Race Condition

[,128)
  • M
Out-of-bounds Read

[,128)
  • M
Access of Uninitialized Pointer

[,128)
  • M
Access Restriction Bypass

[,128)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,127)
  • M
Timing Attack

[,127)
  • H
Use After Free

[,127)
  • M
Cross-site Scripting (XSS)

[,127)
  • H
Out-of-bounds Write

[,127)
  • M
Information Exposure

[,127)
  • H
Use After Free

[,125)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,127)
  • M
Use After Free

[,127)
  • M
Information Exposure

[,127)
  • H
Improper Privilege Management

[,127)
  • M
Out-of-bounds Write

[,127)
  • M
Improperly Implemented Security Check for Standard

[,127)
  • M
Improper Input Validation

[,127)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,127)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,127)
  • M
Exposure of Sensitive Information to an Unauthorized Actor

[,126)
  • M
Reliance on Undefined, Unspecified or Implementation-Defined Behavior

[,126)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,126)
  • C
Use of Insufficiently Random Values

[,126)
  • M
Information Exposure

[,126)
  • M
Improper Initialization

[,126)
  • H
Use After Free

[,126)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,126)
  • L
Access of Uninitialized Pointer

[,126)
  • C
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,126)
  • C
Code Injection

[,126)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,126)
  • M
Classic Buffer Overflow

[,126)
  • C
Use After Free

[,126)
  • M
Use After Free

[,126)
  • H
Resource Exhaustion

[,125)
  • L
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,125)
  • H
Use After Free

[,125)
  • M
Use After Free

[,125)
  • M
Out-of-bounds Read

[,125.0)
  • M
Out-of-bounds Read

[,125)
  • M
Access of Uninitialized Pointer

[,125)
  • H
Out-of-Bounds

[,125)
  • H
Use After Free

[,125)
  • H
Use After Free

[,125)
  • M
Improper Check or Handling of Exceptional Conditions

[,125)
  • M
Insufficient UI Warning of Dangerous Operations

[,125)
  • H
Out-of-bounds Read

[,125)
  • H
Out-of-Bounds

[,125)
  • C
Out-of-bounds Read

[,124.0.1)
  • C
Improper Control of Generation of Code ('Code Injection')

[,124.0.1)
  • M
Improper Privilege Management

[,124)
  • M
Timing Attack

[,124)
  • L
Resource Exhaustion

[,124)
  • H
Code Injection

[,124)
  • M
Cross-Site Request Forgery (CSRF)

[,124)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,124)
  • H
Integer Overflow or Wraparound

[,124)
  • H
Out-of-bounds Write

[,124)
  • H
Out-of-bounds Write

[,124)
  • H
Code Injection

[,124)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,124)
  • C
Out-of-Bounds

[,124.0)
  • H
Out-of-bounds Read

[,123)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,123)
  • H
Open Redirect

[,123)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,123)
  • M
The UI Performs the Wrong Action

[,123)
  • H
Buffer Overflow

[,123)
  • M
Reliance on Cookies without Validation and Integrity Checking

[,123)
  • L
NULL Pointer Dereference

[,123)
  • H
Buffer Overflow

[,123)
  • M
Reliance on Cookies without Validation and Integrity Checking

[,123)
  • M
Incorrect Conversion between Numeric Types

[,123)
  • M
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

[,123.0)
  • M
Denial of Service (DoS)

[,122)
  • M
Use After Free

[,122)
  • H
Improper Check for Unusual or Exceptional Conditions

[,122)
  • H
User Interface (UI) Misrepresentation of Critical Information

[,122)
  • H
Stack-based Buffer Overflow

[,122)
  • C
NULL Pointer Dereference

[,122)
  • M
Inadequate Encryption Strength

[,122)
  • M
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,122)
  • M
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

[,115.7)
  • M
Improper Input Validation

[,115.7)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,115.7)
  • M
Improper Input Validation

[,115.7)
  • M
Improper Access Control

[,122)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,122)
  • M
Out-of-bounds Write

[,122)
  • M
Improper Input Validation

[,121.0)
  • M
Improper Handling of Exceptional Conditions

[,121)
  • M
User Interface (UI) Misrepresentation of Critical Information

[,121)
  • M
Information Exposure Through Log Files

[,121)
  • M
Improper Access Control

[,121)
  • L
Information Exposure

[,121)
  • H
Observable Timing Discrepancy

[,121)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,121.0)
  • M
Improper Input Validation

[,121.0)
  • M
Use After Free

[,121.0)
  • H
Heap-based Buffer Overflow

[,121.0)
  • H
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

[,121.0)
  • H
Use of Uninitialized Resource

[,121.0)
  • M
Improper Input Validation

[,115.6)
  • M
Heap-based Buffer Overflow

[,121)
  • M
Open Redirect

[,120)
  • M
Open Redirect

[,120)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,120)
  • H
Buffer Overflow

[119.,120)
  • H
Out-of-bounds Read

[,120)
  • H
Improper Restriction of Rendered UI Layers or Frames

[,120)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,120)
  • H
Use After Free

[,115.5)
  • M
Directory Traversal

[,115.5)
  • H
Use After Free

[,120)
  • H
Out-of-Bounds

[,119)
  • M
Authentication Bypass Using Spoofing Attack

[,119)
  • H
Buffer Overflow

[,119)
  • M
Information Exposure

[,119)
  • M
Improper Input Validation

[,119)
  • M
Product UI Spoofing

[,119)
  • M
URL Redirection to Untrusted Site

[,119)
  • H
Product UI Manipulable for User-Controlled Input

[,119)
  • M
Improper Release of Memory Before Removing Last Reference

[,119)
  • M
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,119)
  • M
Insufficient UI Warning of Dangerous Operations

[,119)
  • M
Multiple Interpretations of UI Input

[,119)
  • M
Use After Free

[,118)
  • M
Out-of-bounds Write

[,118)
  • H
Use After Free

[,118)
  • H
Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')

[,118)
  • M
Double Free

[,118)
  • H
Out-of-bounds Write

[,118)
  • H
Out-of-bounds Write

[,118)
  • H
Use After Free

[,118)
  • H
Buffer Overflow

[117,118)
  • L
Access Restriction Bypass

[,117)
  • H
Denial of Service (DoS)

[,117)
  • H
Denial of Service (DoS)

[,115.2)
  • H
Denial of Service (DoS)

[,115.2)
  • M
Information Exposure

[,115.2)
  • H
Buffer Overflow

[116,117)
  • H
Buffer Overflow

[,117)
  • H
Use After Free

[,106)
  • M
Improper Access Control

[,116)
  • M
Improper Access Control

[,116)
  • H
Denial of Service (DoS)

[,116)
  • H
Buffer Overflow

[,116)
  • H
Out-of-bounds Read

[,116)
  • M
Improper Access Control

[,116)
  • H
Denial of Service (DoS)

[,116)
  • M
Reliance on Cookies without Validation and Integrity Checking

[,116)
  • H
Race Condition

[,116)
  • M
Improper Input Validation

[,116)
  • H
Insecure Permissions

[,116)
  • H
Unsafe Dependency Resolution

[,116)
  • H
Buffer Overflow

[,116)
  • H
Buffer Overflow

[,116)
  • H
Use After Free

[,115.0.2)
  • M
Cross-site Request Forgery (CSRF)

[,115)
  • H
Denial of Service (DoS)

[,115)
  • M
Improper Input Validation

[,115)
  • H
Use After Free

[,115)
  • H
Improper Input Validation

[,115)
  • M
User Impersonation

[,115)
  • M
Improper Access Control

[,115)
  • M
Improper Access Control

[,115)
  • H
Buffer Overflow

[,115)
  • H
Denial of Service (DoS)

[112,113)
  • M
Improper Access Control

[,113)
  • M
Information Exposure

[,113)
  • H
Denial of Service (DoS)

[,114)
  • M
Open Redirect

[,114)
  • H
Denial of Service (DoS)

[,114)
  • C
Arbitrary Code Execution

[,70)
  • H
Access Control Bypass

[,111)
  • H
Access Control Bypass

[,111)
  • M
Access Control Bypass

[,109)
  • H
Denial of Service (DoS)

[,114)
  • H
Information Exposure

[,111)
  • H
Denial of Service (DoS)

[,110)
  • H
Buffer Overflow

[,114)
  • H
Denial of Service (DoS)

[,109)
  • M
Access Control Bypass

[,109)
  • H
Arbitrary File Read

[,109)
  • H
Arbitrary Code Execution

[110,111)
  • M
Improper Access Control

[,1.1.1)
  • M
Sandbox Bypass

[,112)
  • M
Information Exposure

[,111)
  • M
Insecure Defaults

[,111)
  • H
Denial of Service (DoS)

[,112)
  • M
Information Exposure

[,112)
  • M
Use After Free

[,112)
  • H
Denial of Service (DoS)

[,112)
  • M
Sandbox Bypass

[,112)
  • M
Access Restriction Bypass

[,102.11)
  • H
Out-of-bounds Read

[,102.11)
  • M
Improper Access Control

[,102.11)
  • M
Denial of Service (DoS)

[,102.11)
  • H
Double Free

[,102.10)
  • H
Out-of-Bounds Write

[111,112)
  • L
Access Restriction Bypass

[,112)
  • M
Multiple Interpretations of UI Input

[,112)
  • H
Out-of-Bounds Write

[111,112)
  • H
Out-of-bounds Write

[,112)
  • M
Access Restriction Bypass

[,112)
  • M
Access Restriction Bypass

[,112)
  • H
Denial of Service (DoS)

[,112)
  • M
Access Restriction Bypass

[,112)
  • L
Improper Restriction of Rendered UI Layers or Frames

[,112)
  • M
Access Restriction Bypass

[,112)
  • H
Denial of Service (DoS)

[,112)
  • M
Unsafe Dependency Resolution

[,102.9)
  • M
Information Exposure

[,102.9)
  • M
Incorrect Type Conversion or Cast

[,102.9)
  • M
Out-of-Bounds

[,102.9)
  • H
Arbitrary Code Injection

[,102.9)
  • H
Denial of Service (DoS)

[110,111)
  • H
Improper Restriction of Rendered UI Layers or Frames

[,102.8)
  • M
Cross-site Scripting (XSS)

[,102.8)
  • M
Out-of-Bounds

[,102.8)
  • H
Incorrect Type Conversion or Cast

[,102.8)
  • M
Improper Access Control

[,110)
  • H
Out-of-Bounds

[,102.8)
  • M
Access Restriction Bypass

[,102.8)
  • H
Use After Free

[,102.8)
  • H
Denial of Service (DoS)

[,110)
  • M
Denial of Service (DoS)

[,110)
  • M
Prototype Pollution

[,110)
  • H
Buffer Overflow

[,110)
  • H
Use After Free

[,102.8)
  • H
Denial of Service (DoS)

[,102.8)
  • M
Denial of Service (DoS)

[,102.8)
  • M
Denial of Service (DoS)

[,102.8)
  • M
Information Exposure

[,110)
  • M
NULL Pointer Dereference

[,110)
  • H
Buffer Overflow

[108,109)
  • H
Remote Code Execution (RCE)

[,108)
  • M
Arbitrary File Read

[,102.7)
  • H
Time-of-check Time-of-use (TOCTOU) Race Condition

[,97)
  • H
Sandbox Bypass

[,97)
  • M
Information Exposure

[,97)
  • H
Arbitrary Code Execution

[,97)
  • M
Improper Validation of Array Index

[,101)
  • M
Insufficient Verification of Data Authenticity

[,102)
  • M
Improper Input Validation

[,102)
  • M
Access Restriction Bypass

[,102)
  • M
Improper Input Validation

[,102)
  • M
Denial of Service (DoS)

[,102)
  • H
Arbitrary Code Execution

[,102)
  • M
Information Exposure

[,103)
  • H
Arbitrary Code Execution

[,102)
  • M
Use After Free

[,107)
  • H
Denial of Service (DoS)

[,106)
  • M
Creation of Temporary File With Insecure Permissions

[,107)
  • H
Arbitrary Code Execution

[,97)
  • H
Arbitrary Code Execution

[,101)
  • M
Cross-site Scripting (XSS)

[,102)
  • M
Transmission of Private Resources into a New Sphere ('Resource Leak')

[,107)
  • M
Cross-site Scripting (XSS)

[,101)
  • L
Improper Validation of Certificate Expiration

[,107)
  • M
Cross-site Scripting (XSS)

[,108)
  • H
Arbitrary Code Execution

[,107)
  • L
Information Exposure

[,100)
  • M
Improper Input Validation

[,99)
  • M
Information Exposure

[,98)
  • M
Denial of Service (DoS)

[,98)
  • M
HTTP Header Injection

[,97)
  • M
Improper Resource Shutdown or Release

[,97)
  • M
Buffer Overflow

[,96)
  • M
Improper Access Control

[,96)
  • L
Privilege Escalation

[,96)
  • H
Buffer Overflow

[,98)
  • H
Use After Free

[,95)
  • L
Improper Input Validation

[,104)
  • H
Out-of-Bounds

[,103)
  • L
Use of Cache Containing Sensitive Information

[,103)
  • H
Denial of Service (DoS)

[,95)
  • H
Denial of Service (DoS)

[,106)
  • H
Denial of Service (DoS)

[,108)
  • M
Denial of Service (DoS)

[,99)
  • M
Denial of Service (DoS)

[,102)
  • H
Denial of Service (DoS)

[,97)
  • H
Denial of Service (DoS)

[,100)
  • M
Access Restriction Bypass

[,99)
  • M
Access Restriction Bypass

[,108)
  • M
Information Exposure

[,102)
  • M
Access Restriction Bypass

[,97)
  • M
Denial of Service (DoS)

[,96)
  • L
Insufficiently Protected Credentials

[,106)
  • M
Denial of Service (DoS)

[,99)
  • H
Authorization Bypass

[,97)
  • H
Denial of Service (DoS)

[,108)
  • H
Buffer Overflow

[,107)
  • M
Buffer Overflow

[,102.4)
  • M
Denial of Service (DoS)

[,102.4)
  • M
Buffer Overflow

[,102.4)
  • M
Unsafe Dependency Resolution

[,102.4)
  • M
Unsafe Dependency Resolution

[,102.4)
  • H
Denial of Service (DoS)

[,102.3)
  • H
Information Exposure

[,102.3)
  • H
Denial of Service (DoS)

[,102.3)
  • M
Access Restriction Bypass

[,102.3)
  • M
Denial of Service (DoS)

[,102.3)
  • M
Authorization Bypass

[0,102.3)
  • H
Buffer Overflow

[,104)
  • H
Buffer Overflow

[,104)
  • M
Cross-site Scripting (XSS)

[,91.12)[92.0,102.1)
  • M
Out-of-Bounds

[,102.1)
  • M
Denial of Service (DoS)

[,102.1)
  • M
Return of Wrong Status Code

[,91.11)
  • M
Prototype Pollution

[,91.11)
  • M
Product UI does not Warn User of Unsafe Actions

[,91.11)
  • M
Buffer Overflow

[,91.11)
  • H
Buffer Overflow

[,102)
  • M
Cross-site Scripting (XSS)

[,91.11)
  • M
Cross-site Scripting (XSS)

[,91.11)
  • H
Improper Restriction of Rendered UI Layers or Frames

[,91.11)
  • H
Buffer Overflow

[,99.0.0)
  • H
Improper Input Validation

[,91.7)
  • H
Time-of-check Time-of-use (TOCTOU) Race Condition

[,91.7)
  • C
Use After Free

[,97.0.2)
  • C
Use After Free

[,97.0.2)